On 5/04/13 05:36 AM, James A. Donald wrote:
On 2013-04-05 10:47 AM, James A. Donald wrote:
How does it work? Is it really secure, and if it is, how did they
manage a "not one click for security" user interface?
Already answered by others on this list. Not secure, apple can MIM it.
Seems
On 2013-04-05 10:47 AM, James A. Donald wrote:
How does it work? Is it really secure, and if it is, how did they
manage a "not one click for security" user interface?
Already answered by others on this list. Not secure, apple can MIM it.
___
cryp
On 2013-04-05 6:51 AM, ianG wrote:
"When Apple's iMessage was announced in mid-2011, Cupertino said
it would use "secure end-to-end encryption." It quickly became the
most popular encrypted chat program in history: Apple CEO Tim Cook
said last fall that 300 billion messages have been se
ianG writes:
>"An internal Drug Enforcement Administration document seen by CNET discusses
>a February 2013 criminal investigation and warns that because of the use of
>encryption, "it is impossible to intercept iMessages between two Apple
>devices" even with a court order approved by a federal j
On Thu, Apr 4, 2013 at 3:51 PM, ianG wrote:
> On 4/04/13 21:43 PM, Jon Callas wrote:
>> This is great. It just drives home that usability is all.
>
> Just to underline Jon's message for y'all, they should have waited for
> iMessage:
>
> "Encryption used in Apple's iMessage chat service has s
On Apr 4, 2013, at 4:51 PM, ianG wrote:
> On 4/04/13 21:43 PM, Jon Callas wrote:
>> -BEGIN PGP SIGNED MESSAGE-
>> Hash: SHA1
>>
>>
>> On Apr 4, 2013, at 6:27 AM, ianG wrote:
>>
>>> In a project similar to Wikileaks, ICIJ comments on tools it used to secure
>>> its team-based project
On 4/04/13 21:43 PM, Jon Callas wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Apr 4, 2013, at 6:27 AM, ianG wrote:
In a project similar to Wikileaks, ICIJ comments on tools it used to secure its
team-based project work:
"ICIJ’s team of 86 investigative journalists from 4
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Apr 4, 2013, at 6:27 AM, ianG wrote:
> In a project similar to Wikileaks, ICIJ comments on tools it used to secure
> its team-based project work:
>
> "ICIJ’s team of 86 investigative journalists from 46 countries
> represents one of th
In a project similar to Wikileaks, ICIJ comments on tools it used to
secure its team-based project work:
"ICIJ’s team of 86 investigative journalists from 46 countries
represents one of the biggest cross-border investigative partnerships in
journalism history. Unique digital systems s